Firewall Audit Work Program
Firewall Audit Work Program
Firewall Audit Work Program
1
1 Source: www.knowledgeleader.com
FIREWALL AUDIT WORK PROGRAM: SAMPLE 1
Planning
Fieldwork
AUDIT OBJECTIVES
Documentation
Logical Access
Ensure that logical access to the various components (routers, firewall software,
etc.) of the firewall solution is appropriately restricted to the individuals with
authorized need for such access.
Test Step: Obtain a list of individuals who have access to change configurations
to routers and firewalls.
Ensure that justifications for firewall rules are documented to identify the purpose
of the rules.
Test Step: Obtain firewall rule sets and review for appropriate rule justification
and purpose.
2
2 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
3
3 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Configuration
Firewall components are on an appropriate version and security patches are kept
up to date as vulnerabilities and business reasons dictate.
• A patch ID equates to a certain level of applied patches.
• Available patch updates are monitored and applied, as necessary.
• Active services running on the firewall servers are appropriate.
• Only justified startup scripts are being utilized.
• An appropriate banner is presented during file transport protocol (FTP)
access.
• All server accounts are individual accounts, and any use of an administrator
account is not initiated directly.
Test Step: Meet with a manager and firewall administrators and inquire about
the patch management process and updates of firewalls.
• Obtain a list of available services of the firewall and review it for
reasonableness.
• Obtain and review the startup script for reasonableness.
• Verify that the banner presented during FTP use is appropriate.
• Verify that generic system accounts are not being used.
Obtain the firewall operating system configuration for rejecting and logging
activities. Review to determine that the following system activities are logged:
• Login (unsuccessful and successful)
• Logout (successful)
• Use of privileged commands (unsuccessful and successful)
• Application and session initiation (unsuccessful and successful)
• Use of print command (unsuccessful and successful
• Control permission modification for users and security parameters
(unsuccessful and successful)
4
4 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Documented logging results are monitored, and follow-up actions are performed.
Test Step: Meet with a manager and a firewall administrator and inquire about
the monitoring of logs and the incident response, if needed.
System and firewall logs are rotated to reduce disk space problems. Rotation
should be automatic. Document the retention period.
Test Step: Meet with the systems manager and inquire about the retention of
firewall logs.
When ports or services are needed to administer the firewall and rules exist that
limit what source IP addresses can connect to them.
Test Steps:
5
5 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
• Meet with the systems manager and firewall administrators and inquire about
IP restriction rules.
• Inspect firewall rules for the definition of restricted IP addresses.
Firewall Test
Attempt to port scan the firewall from both the internal network and the Internet,
scanning for Internet control message protocol (ICMP), user datagram protocol
(UDP) and TCP. There should be no open ports and the firewall should not be
able to be pinged.
Test Step: Attempt to port scan the firewall from both the internal network and
the Internet, scanning for ICMP, UDP and TCP. There should be no open ports
and the firewall should not be able to be pinged.
A lockdown rule has been placed at the beginning of the rule base. The lockdown
rule protects the firewall, ensuring that whatever other rules you put in later will
not inadvertently compromise your firewall. If administrative access is required,
then a rule should be placed before the lockdown rule. All other rules should go
after the lockdown rule going from most restrictive to general rules. Review the
remaining rules.
Test Steps:
• Obtain the IS router and firewall standard from (Name). Review the policy to
verify the reasonableness of baseline firewall rules.
• Review the rule set to verify the appropriate use of a lockdown rule.
Obtain and review the connections table for timeout limits and the number of
connections.
• Timeout should be no longer than X minutes (X seconds).
• The firewall's automatic notification alerting features are utilized and
information about the breach/intruder is archived for analysis.
Test Steps:
• Obtain firewall configurations from the firewall administrators.
• Review the configurations and verify:
− Connections time out after an appropriate length of time.
− Connection tables are properly set.
− Automatic notifications are enabled in the event of a security breach.
Application Logs
Separate partitioning for the firewall logging is considered. This may be in the
form of a separate partition on the same server, a second server drive, mirroring
to the disaster recovery site or a centralized logging facility.
Test Step: Meet with the systems manager and firewall administrators and
inquire about the location of where the logs are stored.
Physical Security
Physical access to the various components (routers, firewall software, etc.) of the
firewall solution is appropriately restricted to individuals with an authorized need
6
6 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
for access.
• Lines connected to the firewall hardware are reasonable.
− Obtain a schematic of the lines connected to the applicable firewall
hardware.
− Discuss with the appropriate staff the purpose of each line.
Test Steps:
• Meet with the systems manager and firewall administrators and verify that all
firewalls are physically inside of a data center.
• Inspect the firewall network diagrams to verify that the connected lines are
appropriate.
Continuity of Operations
Fault tolerance (e.g., mirroring of data) has been implemented for the firewall
server.
Redundant components are installed where critical failure points exist, or spare
parts should be on site.
• Use the hardware and software configuration information to identify hardware
and software in place, which provides redundancy and backup.
If single points of failure exist, plans exist to address the situation(s).
Obtain and review a schedule of the retention periods for the firewall's software
components and a schedule of the rotation cycle of the firewall's software.
The disaster recovery plan includes the firewall server.
Test Steps:
• Meet with the systems manager and firewall administrators and discuss the
failover and point of failure strategies of the firewalls.
• Discuss the life expectancy of the firewall software.
• Verify that the disaster recovery plan takes firewalls into account.
7
7 Source: www.knowledgeleader.com
FIREWALL AUDIT WORK PROGRAM: SAMPLE 2
Planning
Fieldwork
Report Issuance
Ensure that the application gateway firewalls host operating system (usually
Unix) has been properly modified to disable services that could be used to
subvert the security of the firewall software program:
• Review start-up files to ensure that all standard network services have been
disabled by commenting out their entries.
8
8 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
• Execute the command at the firewall operating system prompt and review
the output (it should show no routes available) to ensure that IP datagram
routing has been disabled in the operating system kernel.
• Review the content to ensure that they are empty or do not exist on the
system.
• Review the/etc/passwd file to ensure that only the root account and one
firewall administration account are active (not including log-in-disabled
system accounts, bin, wheel, etc.). Assess controls (passwords, logging and
review) overuse of these accounts.
• Review the directory structure to ensure that no other application programs,
language compilers, interpreters or other utilities are loaded on the system.
Review the configuration of the firewall software. Often, a configuration file can
be printed out and reviewed.
• Identify all supported and active network application proxies along with the
indication of where connections may be initiated. (This may be noted as
“trusted network” for connections initiated from the internal network and
“untrusted network” for connections initiated from the external network–the
internet.) Compare this to the internet policy description of authorized
services. Investigate any deviations from the policy. Further, ensure that the
firewall is not configured to automatically trust any outside network.
• For all proxies that allow network connections to be initiated from the
Internet (telnet, FTP, etc.), ensure that strong password authentication
controls are implemented (challenge-response, encryption) or that third-
party security schemes have been implemented (SecureID and S/key).
• For all proxies that allow network connections to be initiated from the
internet, there should normally be restrictions (based on IP addresses or
host names) on the source of such connections and the systems on the
internal network that an internet user may access. Assess the need for
these restrictions and review the configuration of such access controls.
• Review the firewall documentation to ensure that the IP source routing
functionality is disabled in the firewall product.
• Review ID and password controls – authorizations for IDs, password format
and aging controls.
• Review and assess the use of groups to assign services and access
capabilities to users.
• For generic proxy programs that may be in use, review the port number and
IP source and destination restrictions to ensure that they are correctly
designed to restrict this traffic. Assess the need for and implementation of
compensating controls, such as router filters.
• For each proxy, determine that adequate logging mechanisms have been
activated and that logs are reviewed timely. Further, determine who has
access to the logs and ensure that this access is appropriate.
• Review port settings and ensure that all unused ports are disabled. Further,
any active ports must have Cisco Discovery Protocol (CDP), trunking and
spanning tree explicitly disabled.
• Determine whether audit alerts have been adequately designed to alert
management in real-time security events that require prompt attention
(alerts such as spam traps, email messages, pagers, etc.).
9
9 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Determine all remote access mechanisms that are allowed through the firewall.
Ensure that anonymous FTP access is not allowed through the firewall.
• Ensure that the firewall is configured to log off idle user sessions after a set
timeout period.
Ensure that internet control message protocol (ICMP) packets are controlled
inbound and outbound on the firewall.
Ensure that the IP frag guard protects the firewall from IP fragmentation
attacks.
Ensure that RIP or OSPF is disabled so that the firewall does not accept any IP
routing table updates.
Ensure that the SNMP community string on the router has been changed from
public to a password key value.
Ensure that Mail Guard is enabled in the firewall to provide a safe conduit for
simple mail transfer protocol (SMTP) connections from the outside to an inside
electronic mail server.
Review the configuration change log (many firewall products support this) and
investigate a sample of changes from the population with the administrator to
10
10 Source: www.knowledgeleader.com
Time Project Work Step Initial Index
Determine the process of how software upgrades and security patches are
applied to firewalls and routers. Further, determine how administrators are
notified of available updates.
Ensure that third-party penetration tests were performed. Review the testing
results and determine if vulnerabilities were discovered. Follow up with IT
management to determine what action plans were implemented to remediate
the vulnerabilities if any.
11
11 Source: www.knowledgeleader.com